Towards a Safer and More Robust Internet Paul Vixie Internet Software Consortium August 2003.

Slides:



Advertisements
Similar presentations
TURKEY: A DEVELOPING COUNTRY Nur Zincir-Heywood
Advertisements

1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Deploying IPv6: The time is now Are you ready? SFTA 24 May 2012 John Curran President and CEO, ARIN.
Disruption (and Recovery) of the ISP Business Model with IPv4 Depletion PTC12 15 January 2012 John Curran President and CEO, ARIN.
Internet Protocols and Innovation John C Klensin John C Klensin and Associates
“The Internet in South East Asia” Sam Paltridge, OECD Organized by the International Telecommunication Union (ITU), hosted by the Post and Telegraph.
1 Linux IP Masquerading Brian Vargyas XNet Information Systems.
About IP Addresses
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-ietf-mobike-design-00.txt Tero Kivinen
The Platform as a Service Model for Networking Eric Keller, Jennifer Rexford Princeton University INM/WREN 2010.
Any Questions?.
IPv4 to IPv6 transition ALS Capacity Building April 2014
Building An IPv6 Deployment Plan v0.1 Alastair Matthews Network Engineer.
IPv6 Activities and Update in Thailand Sinchai Kamolphiwong IPv6 Forum Thailand IPv6 WG, UniNet NGI.
Worms – Code Red BD 480 This presentation is an amalgam of presentations by David Moore, Randy Marchany and Ed Skoudis. I have edited and added material.
Update about the “SHOULDs Analysing Project” in RIPE Policy Documents “Should” we use the RFC 2119 Defined Language in RIPE Policy Documents? Jan Žorž,
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
(Director of Internet Technology Team, KISA)
PPPoE Last Update Copyright Kenneth M. Chipps Ph.D. 1.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Ethernet and switches selected topics 1. Agenda Scaling ethernet infrastructure VLANs 2.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
WS-Denial_of_Service Dariusz Grabka M.Sc. Candidate University of Guelph February 13 th 2007.
Application Layer At long last we can ask the question - how does the user interface with the network?
How the Internet Works Jon Crowcroft,
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
WAN Technology Overview Lecture 3: Introduction to WAN.
Application Service Providers. Introduction Application Service Provider or (ASP) has a significant placement in the business world. ASP provides customers.
Norman SecureSurf Protect your users when surfing the Internet.
Technology ICT Communications & Computer Networks Resource Notes - Network Software.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Embracing IP Multimedia Services for Strategic Business Advantage Rick Seeto VP & GM Enterprise Networks, Asia Pacific.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
Chapter 1 Intro to Routing & Switching.  Networks have changed how we communicate  Everyone can connect & share  How have networks changed the way…
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 2 This material was developed by Oregon Health.
DHCP Security DHCP Snooping and Security David Mitchell 03/19/2008.
Ministry of State for Administrative Development Towards Meaningful ICT Indicators for Developing Countries Dr. Ahmed M. Darwish EGYPT Government and Education.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Resilience of the Internet Interconnection Ecosystem Chris Hall Ross Anderson Richard Clayton Evangelos Ouzounis Panagiotis Trimintzios WEIS 14 th June.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Protecting Students on the School Computer Network Enfield High School.
NETWORKING and the INTERNET
Communication, Networks, The internet and the Worldwide Web.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Networks: LANs, WANs and Communication Protocols How do computers communicate?
Juan Ortega 8/20/09 NTS300. Right now IPv4 dominates the Internet with some experts believing the need for IPv6 isn’t necessary because of NAT. But even.
THE INTERNET INTRODUCTION TO BUSINESS TECHNOLOGY.
1 TEMENOS HOME Global Conference on Access to Finance Washington DC 30 th and 31 st May 2006 Murray Gardiner.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Small Peer-Peer PC Network No dedicated (full- time) server User PCs supply services to each other So user PCs act both as clients and as servers.
IS Infrastructure Managing Infrastructure and Services Copyright © 2016 Curt Hill.
COMP 431 Internet Services & Protocols
Why Internet Business? Fact #1 – There Are Over 1.3 Billion Internet Users Today (SOURCE: InternetWorldStats.com) Fact #2 – Last Year, More Than 300 Billion.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Internet of Things – Getting Started
Design and Deployment of a Global Data-Collection Infrastructure Version 1.0 January, 2004 Bill Woodcock Packet Clearing House.
The Network Layer UNIT-4 snistforum.com. Network Layer Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation.
4.3 Network Layer Logical Addressing
Internet Quarantine: Requirements for Containing Self-Propagating Code
Common Methods Used to Commit Computer Crimes
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
THE NEED FOR DNS DOMAIN NAME SYSTEM
Communications & Computer Networks Resource Notes - Network Software
Internet Interconnection
Interconnection services UPDATE
Presentation transcript:

Towards a Safer and More Robust Internet Paul Vixie Internet Software Consortium August 2003

Success Disasters An idea can work well in a laboratory –everything works as it should And in testing –Small, controlled population –Limited patterns of use But fail in the broad public marketplace –6 is not 60 is not –Some malicious users or observers

Example Success Disasters Internet HOSTS.TXT file –Listed every internet-connected host of the day –Impossible to update, distribute, search at scale –Thus: DNS Classful Internet addressing –100 A, B, C networks –Impossible to create/maintain routing table –Thus: CIDR

More Examples 4 billion hosts allowed in IPv4 –Not enough for each person on Terra –Definitely not enough for each cell phone –Thus: IPv6 Networks operated by right-of-way owners –ISPs operate networks with leased assets –ISPs are more plentiful than Telcos –Thus: Internet Exchange Points

Even More Examples DNS protocol only allows 13 root servers –Unforeseen result of early IPv4 design choices –Host population demands vastly better coverage –Thus: anycast Dot Com bubble made many millionaires –Investors bought stock for resale, not dividends –Not every 20-something can be a millionaire! –Thus: crash and recession

Current Examples ISP operators must be experts in their field –Very little off the shelf technology or training –Vendor defaults are completely inappropriate –Thus: no admission control on customer traffic Host operators must be expert technologists –The Internet is full of dangerous places/people –PC and DSL market allows universal access –Thus: wide scale vulnerability and abuse

Problem Size and Scope The Internet doubled in size every 16 months from 1990 to 1999 Its not even theoretically possible to map it –Or list vulnerable hosts (or fix them) –Or keep track of bad actors (or arrest them) The Internet has become a new ecosystem –Like biology: can be studied but not understood

Necessary Next Steps (1) Make infrastructure stronger, more robust Increase technology training by 1000x –Starting with students still in school –Including vendor engineers –Including ISP operators –Including home users Note: any country can still compete

Necessary Next Steps (2) Make mirror copies of important servers –F.root-servers.org now in Palo Alto, Madrid, Hong Kong, Los Angeles, New York City, Seoul, Auckland, Rome, Sao Paulo; coming soon to a few dozen more cities Add security to core Internet protocols –DNS was never secure, but it can be made so –ISC and others are very active in this area

Necessary Next Steps (3) Increase interconnection between ISPs –Stop depending on few/large intermediaries –Every metro needs its own IP exchange –Regulated carriers must be required to join Teach moral philosophy (ethics) in schools –Most Internet attacks are by children/teenagers –Damage done feels remote and theoretical –Many literally do not know right from wrong

Probable Next Steps All of this will cost more money –Increase size and training level at ISPs –Increase training available to home users –Increase interconnectivity between ISPs Internet usage fees are artificially low –Cost models are still immature –Many services are sold below current costs

Conclusions Biggest Internet engineering problem, ever: –Scaling Cyberspace and meatspace are now merging –Problems in either are really problems in both Weve got to take all of this more seriously –Internet vulnerability is a problem for society Its not a sandbox or a laboratory any more –Safety is more important than money, or fun